THE WHATIS.COM WORD-OF-THE-DAY   
July 22, 2003

strong password 

________________
SPONSORED BY: AMD

64-bit computing software 
If you need more performance or are developing new applications, you
may want to consider migrating from 32-bits to 64-bits. Wondering how
much work is involved and which enterprise apps will most benefit?
Find out here. http://WhatIs.com/r/0,,16211,00.htm?amd 

________________   
TODAY'S WORD: strong password 

See our complete definition with hyperlinks at
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci914537,00.html 

Strong password is one that is designed to be hard for a person or
program to discover. Because the purpose of a password is to ensure
that only authorized users can access resources, a password that is
easy to guess is a security risk. Essential components of a strong
password include sufficient length and a mix of character types. When
people create passwords, they often defeat the purpose by choosing
parts of their names, the names of their pets, or even the word
"password." A typical weak password is short and consists solely of
letters in a single case. 

You can make your password much harder to break by using more
characters, mixing upper and lower case letters, and including
numbers and special characters. According to a security guide from
Texas A&M University's Research Foundation, a six-character,
single-case password has 308 million possible combinations, all of
which a password cracker can go through in just a few minutes.
Combining upper and lower case letters and using eight characters
instead of six increases the possible combinations to 53 trillion;
substituting a number for one of the letters yields 218 trillion
possibilites; and substituting a special character or punctuation for
another yields 6,095 trillion possible combinations. Although a
password cracker can eventually go through that many combinations, it
requires much more time and computing power. 

People like to use passwords that will be easy for them to remember.
A Microsoft article about security suggests that you use a memorable
phrase instead of a word, and convert that phrase to a password. For
example, the phrase, "I have 2 Labrador retrievers! Fido and Spot."
could be expressed as Ih2Lr!F+S. To make the password even more
cryptic, you can use the last letters of words instead of the first,
and reverse the case: iE2rS!o+t. 

______________________
SELECTED LINKS:

SearchNetworking features an article called "Business security begins
with a strong password policy."  
http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci862091,00.html 

Microsoft provides a security checklist: Create Strong Passwords.  
http://www.microsoft.com/security/articles/password.asp 

Texas A&M University Research Foundation's security guide provides a
tutorial on Weak Passwords.  
http://rf-web.tamu.edu/security/SECGUIDE/V1comput/Password.htm 

______________________
RELATED TERMS:

password cracker 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci536994,00.html 

______________________
TODAY'S TECH NEWS:

ORACLE, MAGNAWARE LEND RECRUITERS A HAND
Oracle Corp. and MagnaWare Software are joining forces to help hiring
managers process the piles of resumes that cross their desks and
flood their in-boxes. 
http://searchoracle.techtarget.com/originalContent/0,289142,sid41_gci915481,00.html 

EXPLOIT CODE LURKS FOR CISCO FLAW
The Cisco IOS flaw became more dangerous over the weekend as the code
to exploit it was posted on public mailing lists. 
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci915495,00.html 

HP RELEASES WEB SERVICES MANAGEMENT SPEC
Hewlett-Packard Co. on Monday released a proposed Web services
standard it says will help companies manage such services -- and the
platforms on which they run. 
http://searchwebservices.techtarget.com/originalContent/0,289142,sid26_gci915457,00.html
 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com/ 
 
______________________
Secret Word-of-the-Day | What is it?

This is a list of IP addresses known to be sources of spam. 

>> Click for correct answer
http://whatis.techtarget.com/definition/0,289893,sid9_gci840315,00.html 

_____________________

Quiz #5 | General IT terms

Do you know how the Internet works? Take this week's quiz and find
out! 

>> Click to take the quiz
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci553879,00.html

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] Direct-to-Edit 
http://whatis.techtarget.com/definition/0,,sid9_gci915303,00.html

[2] assistive technology 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci914775,00.html

[3] FireWire 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212126,00.html

[4] cache cramming 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci914394,00.html

[5] Government Information Awareness 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci914344,00.html

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media. http://www.techtarget.com

Copyright 2003 TechTarget. All rights reserved.


Unsubscribe from 'Word of the Day'
 - Simply Reply to this E-mail with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to